The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel before 2.6.39 does not ensure that a certain device field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause a denial of service (BUG and system crash), via a BNEPCONNADD command.
https://github.com/torvalds/linux/commit/43629f8f5ea32a998d06d1bb41eefa0e821ff573
https://bugzilla.redhat.com/show_bug.cgi?id=681260
http://www.openwall.com/lists/oss-security/2011/03/01/10
http://rhn.redhat.com/errata/RHSA-2011-0833.html
http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html
http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39